2dix-The Student Choice
Log in Register now

Term paper on BOOK STORE AUTOMATION SYSTEM with C Language Programming

I take this opportunity to present my votes of thanks to all those guidepost who really acted as lightening pillars to enlighten our way throughout this project that has led to successful and satisfactory completion of this study.We are really grateful to our HOD Mr. Rohit Dhand for providing us with an opportunity to undertake this project in this university and providing us with all the facilities. We are highly thankful to Miss Sukhdilpreet Kaur for her active support, valuable time and advice, whole-hearted guidance, sincere cooperation and pains-taking involvement during the study and in completing the assignment of preparing the said project within the time stipulated.Lastly, We are thankful to all those, particularly the various friends , who have been instrumental in creating proper, healthy and conductive environment and including new and fresh innovative ideas for us during the project, their help, it would have been extremely difficult for us to prepare the project in a time bound framework.

Term paper on 802.11 Wireless Networks

Organizations over the last few years have expended a considerable effort to protect their internal infrastructure from external compromise. As a result, the organizations have canalized their external network traffic through distinct openings protected by firewalls. The idea is simple. By limiting external connections to a few well protected openings, the organization can better protect itself. Unfortunately, the deployment of a wireless network opens a “back door” into the internal network that permits an attacker access beyond the physical security perimeter of the organization. As a result, the attacker can implement the “parking lot” attack, see figure 1, where the attacker sits in the organization’s parking lot and accesses hosts on the internal network. Ironically in some cases, the existence of the firewall may make the organization’s hosts more vulnerable to the attacker because of the mistaken premise that the hosts are immune from attack and potential compromise.

 

Term Paper on Attacking Wi-Fi nets with traffic injection

The injection attack involves "injecting" or forcefully inserting fragments or complete code. This is usually aimed at altering the normal path or execution of the flow of the operation. Injecting is usually done in places where user input is requested, and instead of entering standard inputs, the attacker inserts codes, thus leading to the name, injection attack.

In a traffic injection attack, a cracker can make use of access points that are exposed to non-filtered network traffic, specifically broadcasting network traffic such as “Spanning Tree” (802.1D), OSPF, RIP, and HSRP. The cracker injects bogus networking re-configuration commands that affect routers, switches, and intelligent hubs. A whole network can be brought down in this manner and require rebooting or even reprogramming of all intelligent networking devices.

Term Paper on PARKING RECORD SYSTEM with Program code in C language

First and the foremost I would like to thank to my almighty for giving me courage to bring up this term assignment.

At the outset, I would like to propose a word of thanks to my teacher, friends and other sources that gave an unending support and helped me in numerous ways from the first stage of my term assignment conceived.

I would also like to thank my family members for their whole hearted support and cooperation.

I duly acknowledge the contribution of ms. Darvindar kaur for invaluable help. Coding scientific calculator is an uphill task and would have not been possible without proper and timely assistance of ms. Darvindar  Kaur.

I would also thanks to all my friends for forwarding their suggestions to make necessary modifications.

Special thanks to Ms. Darvindar  Kaur for her able guidance in my term assignment

 

Term Paper of SCIENTIFIC CALCULATOR in C Programming

The calculator was written by Rolf  Howarth in early 1996. A fully featured scientific calculator with proper operator precedence is implemented, including trig functions and logarithms, factorials, 12 levels of parentheses, logs to base 2 (a handy function for information entropists!), bitwise logical operators, hex, octal, binary and ASCII display.  

The calculator is written in JavaScript and you are welcome to view the JavaScript source (visible within the HTML page) for personal educational purposes as long as you recognize that it is copyrighted and not in the public domain. This calculator is now available as part of hummingbird's Enterprise Information Portal. All enquiries regarding licensing the calculator should be directed to Hummingbird Ltd.

Source code for Examination management system in c language

As we all know that time is very precious and no one is ready to waste his time .so we are designing a project that will help to save the time of people in schools and colleges.The project  helps the teachers to make the results of the students easily and quickly. This software is designed to enter the marks and other details by only entering the rollno of the student.The whole details of the class can be seen easily.Also the toppers and failures can be easily known of the class. This software will help to save the time and also decrease the mistakes that are made manually .So we hope that this software will help to save the Time and data.

C Program Code For Vehicle Parking System Term Paper

struct vechicle
{
    float charge;
    int vechicletype;
    char carnumber[10];    
    int tokenno;
    float timein;
    float total;
    float timeout;
};

Term paper on Oscillator

A Zener diode is a type of diode that permits current to flow in the forward direction like a normal diode, but also in the reverse direction if the voltage is larger than the rated breakdown voltage or "Zener voltage". The device was named for Clarence Zener, who discovered this electrical property.

Term paper on Zener Diode

A Zener diode is a type of diode that permits current to flow in the forward direction like a normal diode, but also in the reverse direction if the voltage is larger than the rated breakdown voltage or "Zener voltage". The device was named for Clarence Zener, who discovered this electrical property.

Term Paper on ATTENDENCE RECORD SYSTEM with C Programming

I take this opportunity to present my votes of thanks to all those guidepost who really acted as lightening pillars to enlighten our way throughout this project that has led to successful and satisfactory completion of this study.

We are really grateful to our HOD Mr. Ankur sodhi for providing us with an opportunity to undertake this project in this university and providing us with all the facilities. We are highly thankful to Miss .Darvinder Kaur for her active support, valuable time and advice, whole-hearted guidance, sincere cooperation and pains-taking involvement during the study and in completing the assignment of preparing the said project within the time stipulated.

Lastly, We are thankful to all those, particularly the various friends , who have been instrumental in creating proper, healthy and conductive environment and including new and fresh innovative ideas for us during the project, their help, it would have been extremely difficult for us to prepare the project in a time bound framework.

Term Paper on Digital calender with C Programming

The title of the project is DIGITAL CALENDAR which is an embedded based project. An embedded project is a combination of hardware and software. Microprocessors and microcontrollers are widely used in such embedded system products. Each embedded system is unique and highly customized to the application at hand. The main basics that includes in embedded programming are either assembly programming or it may be high level languages such as C,C++ or Embedded C. This project ³DIGITAL CALENDAR´ using microcontroller is an advanced digital calendar, which displays the Seconds, Minutes, Hours, Date, Day, month over the LCD display. It has the advantage of setting these features. It has an 8-bit microcontroller which runs on the program embedded in ROM.

Perfusion Functional MRI reveals cerebral blood flow pattern under psychological stress

Despite the prevalence of stress in everyday life and its impact on happiness, health, and cognition, little is known about the neural substrate of the experience of everyday stress in humans. We use a quantitative and noninvasive neuroimaging technique, arterial spin-labeling perfusion MRI, to measure cerebral blood flow (CBF) changes associated with mild to moderate stress induced by a mental arithmetic task with performance monitoring. Elicitation of stress was verified by self-report of stress and emotional state and measures of heart rate and salivary-cortisol level. The change in CBF induced by the stress task was positively correlated with subjective stress rating in the ventral right prefrontal cortex (RPFC) and left insula/putamen area. The ventral RPFC along with right insula/putamen and anterior cingulate showed sustained activation after task completion in subjects reporting a high stress level during arithmetic tasks. Additionally, variations of baseline CBF in the ventral RPFC and right orbitofrontal cortex were found to correlate with changes in salivary-cortisol level and heart rate caused by undergoing stress tasks. We further demonstrated that the observed right prefrontal activation could not be attributed to increased cognitive demand accompanying stress tasks and extended beyond neural pathways associated with negative emotions. Our results provide neuroimaging evidence that psychological stress induces negative emotion and vigilance and that the ventral RPFC plays a key role in the central stress response.

To develop a program for computing circular convolution Using MATLAB

Circular convolution is another way of finding the convolution sum of two input signals.
It resembles the linear convolution, except that the sample values of one of the input signals is
folded and right shifted before the convolution sum is found. Also note that circular convolution
could also be found by taking the DFT of the two input signals and finding the product of the
two frequency domain signals. The Inverse DFT of the product would give the output of the
signal in the time domain which is the circular convolution output. The two input signals could
have been of varying sample lengths. But we take the DFT of higher point, which ever signals
levels to. For eg. If one of the signal is of length 256 and the other spans 51 samples, then we
could only take 256 point DFT. So the output of IDFT would be containing 256 samples instead
of 306 samples, which follows N1+N2 – 1 where N1 & N2 are the lengths 256 and 51
respectively of the two inputs. Thus the output which should have been 306 samples long is
fitted into 256 samples. The 256 points end up being a distorted version of the correct signal.
This process is called circular convolution.

Book store automation system in C++

In the existing system, most of the records are maintained on paper. It becomes very inconvenient to modify the data. In the existing system, here is a possibility that the same data in different registers may have different values which means the entries of the same data do not match. This inconsistent state does not supply the concrete information which poses a problem in the case information related to particular search record.

Our project is very useful. User is no longer required to check his register in search of records, as now it can be searched over the software by choosing some options. The user need not to type in most of the information. He/she is just required to enter the desired options. On the whole it liberates the user from keeping lengthy manual records. In a nutshell, it abates the work load of an organization.

In today’s world, no one likes to perform calculations on calculator or manually when computer is there. Every one wants his/her work to be done by computer automatically and displaying the result for further manipulations.

A book shop uses a personal computer to maintain the inventory of books that are being sold at the shop. The list includes details such as author, title, price, publisher, stock position,etc. Whenever a customer wants a book, the shopkeeper inputs the title and author of the book and the system replies whether it is in the list or not. If it is not, an appropriate message s displayed. If book is in the list, then the system displays the book details and asks for number of copies. If the requested copies are available the, total cost of the books is displayed; otherwise the message "Required copies not in stock” is displayed.

Term Paper on EXAMINATION MANAGEMENT SYSTEM

As we all know that time is very precious and no one is ready to waste his time .so we are designing a project that will help to save the time of people in schools and colleges.The project  helps the teachers to make the results of the students easily and quickly. This software is designed to enter the marks and other details by only entering the rollno of the student.The whole details of the class can be seen easily.Also the toppers and failures can be easily known of the class. This software will help to save the time and also decrease the mistakes that are made manually .So we hope that this software will help to save the Time and data.
1 2 »